Static task
static1
General
-
Target
16c503ab9dc7a7857a6cf0338be7a200_NeikiAnalytics.exe
-
Size
174KB
-
MD5
16c503ab9dc7a7857a6cf0338be7a200
-
SHA1
b6189341285bb9e9888bc119703dac092d441e24
-
SHA256
8dfca4c02cae0409a0beb3760087e8f5cefa397b8fbc7479f0fb626e8901eb20
-
SHA512
dda5597ed20aded3b257f5f0decc86f1d9408ecb730d8f337384ceedd03b253c894669f99293df925803c2b3ce283c8b3b11584f1528ce043665fb46ed0ecace
-
SSDEEP
3072:LXepT2TbcnzzW44AIUxtS3NTQbg6bWJ2c8hZ+8iu7Ibf3a8Y0rRAXoLjHwSIisuA:LXeubPJQb3+WZr0FYGzRIBNB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 16c503ab9dc7a7857a6cf0338be7a200_NeikiAnalytics.exe
Files
-
16c503ab9dc7a7857a6cf0338be7a200_NeikiAnalytics.exe.sys windows:10 windows x64 arch:x64
f73f24228894974aef90f517b5c53650
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
NtOpenFile
__chkstk
RtlInitUnicodeString
MmGetSystemRoutineAddress
ExAllocatePoolWithTag
ExFreePoolWithTag
RtlGetVersion
KeDelayExecutionThread
Sections
.text Size: 166KB - Virtual size: 165KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 516B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 512B - Virtual size: 290B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE